Search Results - (( integer application tools algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- integer application »
- data normalization »
- application tools »
- tools algorithm »
- java »
-
1
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…The extended MILP technique is able to provide an automatic security estimation tool by giving accurate results. Overall, it is applicable to an extensive variety of block cipher algorithm that makes it an adaptable tool for industrial purposes and scholarly research.…”
Get full text
Get full text
Get full text
Article -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Development of interactive application for classification of Artocarpus Species
Published 2020“…The aim of this research is to identify the classification of Artocarpus species by using interactive application and the effectiveness of the interactive application for classification of Artocarpus species. …”
Get full text
Undergraduate Final Project Report -
5
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
Programming Approach in Teaching Operations Research Techniques for Computer Science Students
Published 2005Get full text
Get full text
Conference or Workshop Item -
9
-
10
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
11
Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End
Published 2012“…This solution is the upper bound solution. The application of the proposed algorithm shows significant reduction in the computational effort involved in solving the problem. …”
Get full text
Get full text
Final Year Project -
12
Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End
Published 2009“…This solution is the upper bound solution. The application of the proposed algorithm shows significant reduction in the computational effort involved in solving the problem. …”
Get full text
Get full text
Final Year Project -
13
-
14
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Development of optimized maintenance scheduling model for coal-fired power plant boiler
Published 2023text::Thesis
